home_banner `

Content Icon

Set an Optimal Social Media Usage Policy

April 12, 2018 | Ask-An-Expert | Security Policies and Strategy | By Aaron Turner, IANS Faculty

Like all things in infosec, social media usage policies must strive to balance security with business benefits. In this Ask-an-Expert written response, IANS Faculty Aaron Turner explains the pros and cons of strict vs. permissive social media policies and suggests the best path forward is to balance unfettered social media engagement with smart investments in SSL decryption and other monitoring solutions.
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Security Program Maturity Assessment – RFP Template

This template is designed to be used to evaluate vendors performing a security program maturity assessment. 

Poll: Best Ways to Encourage PAM Tool Usage

What statements or phrases can help increase adoption of tools like Thycotic Secret Server? In this Viewpoints report, IANS Faculty Josh More, Adam Shostack and Jason Gillam offer some tried-and-true strategies.

Information Security Job Description Templates (Updated)

With the information security workforce shortage projected to reach 2-3 million over the next few years, organizations are putting a greater emphasis on their recruiting process to better fill out their security teams. Use these sample infosec job descriptions to set the foundation for role expectations and attract the most highly qualified professionals to your organization. 

Customer-Infosec Advisory Council Charter and Bylaws Template

This template documents a charter and bylaws for a customer-infosec advisory council designed to facilitate the sharing of company infosec capabilities and roadmaps with customers, and customer experiences and concerns with the company.